-
1
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01Subjects: Get full text
Article -
2
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
3
A discovery strategy for APT anomaly based on homologous behavior analysis
Published 2016-01-01Subjects: “…APT defense…”
Get full text
Article -
4
Survey of attack and detection based on the full life cycle of APT
Published 2024-09-01Subjects: “…APT…”
Get full text
Article -
5
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Subjects: “…APT…”
Get full text
Article -
6
Optimal active defense decision model of wireless communication network under APT attack
Published 2024-02-01Subjects: “…APT attack…”
Get full text
Article -
7
Multi-stage detection method for APT attack based on sample feature reinforcement
Published 2022-12-01Subjects: “…APT attack detection…”
Get full text
Article -
8
Local plastic deformation in the vicinity of topologically close-packed phases in a Ni-based single crystal superalloy
Published 2025-02-01Subjects: Get full text
Article